21
Views
1
CrossRef citations to date
0
Altmetric
Articles

Assessing & Quantifying the Loss of Network Intrusion

, &
Pages 36-43 | Published online: 05 Jan 2016
 

Abstract

Despite the increasing frequency and cost of network security breaches, many organizations still question the need to invest in security technology. This paper utilizes a Bayesian influence diagram in conjunction with a decision tree to quantify the cost of network intrusion. Quantifying this cost permits managers to compare the loss associated with network security breaches with the cost of utilizing appropriate IS security technology. The model developed within is applied to a simple example of a firewall implementation.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.